Privacy on Inference Leaking of URL Shortening Service on Twitter

Twitter is a well-known online genial system settlement for sharing succinct messages (tweets) among companions. Its clients every now and again utilize URL truncating facilities that give (i) a short nom de plume of a long URL for sharing it using tweets and (ii) open snap investigation of truncated URLs. The general population click examination is given in an accumulated frame to safeguard the security of individual clients. In this paper, we propose handy assault strategies deriving who clicks which limited URLs on Twitter using the cumulating of open data: Twitter metadata and open snap investigation. Not at all like the ordinary program history purloining assaults, have our assailants just requested openly accessible data given by Twitter and URL limiting lodging. The assessment comes about demonstrate that our assailant can bargain Twitter client’s security with high accuracy.

A. Chaabane, G. Acs, and M. A. Kaafar. You are what you like! Information leakage through users’ interests. In Proc. 19th Network and Distributed System Security Symp. (NDSS), 2012.

Z. Cheng, J. Caverlee, and K. Lee. You are where you tweet: A content-based approach to geo-locating twitter users. In Proc. 19th ACM International Conference on Information and Knowledge Management (CIKM), 2010.